Page 5 of 31 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 70EXPL: 2

The (1) dbsnmp and (2) nmo programs in Oracle 8i, Oracle 9i, and Oracle IAS 9.0.2.0.1, on Unix systems, use a default path to find and execute library files while operating at raised privileges, which allows certain Oracle user accounts to gain root privileges via a modified libclntsh.so.9.0. • https://www.exploit-db.com/exploits/24335 http://marc.info/?l=bugtraq&m=109147677214087&w=2 http://secunia.com/advisories/12205 http://www.securityfocus.com/bid/10829 https://exchange.xforce.ibmcloud.com/vulnerabilities/16839 •

CVSS: 9.0EPSS: 30%CPEs: 31EXPL: 0

Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter. Desbordamiento de búfer basado en la pila en Oracle Net Sevices de Oracle Database Server 9i release 2 y anteriores permite a atacantes ejecutar código arbitrario mediante una consulta "CREATE DATABASE LINK" conteniendo una cadena de conexión con un parámetro USING largo. • http://marc.info/?l=bugtraq&m=105162831008176&w=2 http://marc.info/?l=ntbugtraq&m=105163376015735&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert54.pdf http://www.ciac.org/ciac/bulletins/n-085.shtml http://www.securityfocus.com/bid/7453 https://exchange.xforce.ibmcloud.com/vulnerabilities/11885 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 67%CPEs: 10EXPL: 0

Buffer overflow in ORACLE.EXE for Oracle Database Server 9i, 8i, 8.1.7, and 8.0.6 allows remote attackers to execute arbitrary code via a long username that is provided during login, as exploitable through client applications that perform their own authentication, as demonstrated using LOADPSP. • http://marc.info/?l=bugtraq&m=104549693426042&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert51.pdf http://www.cert.org/advisories/CA-2003-05.html http://www.ciac.org/ciac/bulletins/n-046.shtml http://www.iss.net/security_center/static/11328.php http://www.kb.cert.org/vuls/id/953746 http://www.osvdb.org/6319 http://www.securityfocus.com/bid/6849 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 2%CPEs: 10EXPL: 0

Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to the TZ_OFFSET function, or (3) a long DIRECTORY parameter to the BFILENAME function. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0073.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0075.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0083.html http://marc.info/?l=bugtraq&m=104549743326864&w=2 http://marc.info/?l=bugtraq&m=104549782327321&w=2 http://marc.info/?l=bugtraq&m=104550346303295&w=2 http://otn.oracle.com/deploy/security/pdf/2003alert48.pdf http://otn.oracle.com/deploy/security/pdf/2003alert49.pdf http:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Format string vulnerabilities in Oracle Listener Control utility (lsnrctl) for Oracle 9.2 and 9.0, 8.1, and 7.3.4, allow remote attackers to execute arbitrary code on the Oracle DBA system by placing format strings into certain entries in the listener.ora configuration file. Vulnerabilidad de formato de cadenas en la utilidad Oracle Listener Control (lsnrctl) en Oracle 9.2, 9.0, 8.1 y 7.3.4 permite a atacantes remotos ejecutar código arbitrario el sitstema Oracle DBA mediante la introducción de cadenas de formato en ciertas entradas en fichero de configuración listener.ora • http://marc.info/?l=bugtraq&m=102933735716634&w=2 http://otn.oracle.com/deploy/security/pdf/2002alert40rev1.pdf http://securitytracker.com/id?1005037 http://www.kb.cert.org/vuls/id/301059 http://www.ngssoftware.com/advisories/ora-lsnrfmtstr.txt http://www.securityfocus.com/bid/5460 •